Data Security

The following 177 items are listed by Content Data.
Newsletters

The Board’s Role in the Transformation of Work

In this issue of Board Perspectives, we explore how boards and directors can facilitate a hybrid work model.
Subscriber Content
Mon, Oct 31, 2022
Checklists & Questionnaires

Data Governance Questionnaire

The questions included in this tool can be used by organizations to create an effective data governance framework.
Subscriber Content
Mon, Oct 17, 2022
Policies & Procedures

Data Center Security Policy

This sample policy establishes operational standards for the physical security of a company’s data center.
Subscriber Content
Mon, Aug 29, 2022
Audit Programs

Network Device Configuration Management Audit Work Program

This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Mon, Aug 8, 2022
Articles

Greg Lindsay on the Way We Live Next – Audio Transcript

A look at the evolution urban areas are undergoing post-COVID and how those changes will alter cities over the next deca...
Subscriber Content
Mon, Aug 1, 2022
Data Analytics CPE Courses

Using Advanced Analytics to Move into Continuous Monitoring (KLplus CPE Course)

Learn how to leverage data and technology to understand the risks that are critical to the business.
Mon, Jul 25, 2022
Articles

Go! Mindblowing Mobility Driving Transportation’s Transformation

In this article, we discuss the future of urban mobility and the technologies that will disrupt transportation as we kno...
Subscriber Content
Mon, Jul 4, 2022
Policies & Procedures

Security Awareness Policy

This sample policy is designed to help organizations notify information system users about security policies, guidelines...
Subscriber Content
Mon, Jun 20, 2022
Audit Programs

Enterprise Risk Planning (ERP) Integration Architecture Audit Work Program

This work program template provides steps organizations can take to perform an enterprise risk planning (ERP) integratio...
Subscriber Content
Mon, Jun 6, 2022
Policies & Procedures

Physical and Environmental Security Policy

This sample policy is designed to help organizations prevent unauthorized access, damage and interference to business pr...
Subscriber Content
Mon, Jun 6, 2022
Benchmarking Reports

Executive Perspectives on Top Risks in 2021 and 2030: Chief Audit Executive Results

This report recaps the top risks CAEs should keep in mind over the next decade, according to the results of Protiviti’s ...
Subscriber Content
Mon, May 30, 2022
Risk & Control Matrices - RCMs

Manage Data Center Operations: Metadata Management RCM

This document outlines risks and controls common to metadata management in a risk control matrix (RCM) format.
Subscriber Content
Mon, Feb 28, 2022